{"id":109,"date":"2013-04-19T22:53:59","date_gmt":"2013-04-20T02:53:59","guid":{"rendered":"http:\/\/sites.law.duq.edu\/juris\/?p=109"},"modified":"2013-09-05T00:04:17","modified_gmt":"2013-09-05T04:04:17","slug":"catfish-season","status":"publish","type":"post","link":"https:\/\/sites.law.duq.edu\/juris\/2013\/04\/19\/catfish-season\/","title":{"rendered":"Catfish Season"},"content":{"rendered":"<p style=\"text-align: center;\"><a href=\"http:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2013\/09\/catfishheading.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-110\" alt=\"catfishheading\" src=\"http:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2013\/09\/catfishheading.png\" width=\"560\" height=\"277\" srcset=\"https:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2013\/09\/catfishheading.png 830w, https:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2013\/09\/catfishheading-300x148.png 300w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">by Amy Coleman, Staff Writer<\/p>\n<p>For those that are not up to speed on the Facebook lingo, a \u201cCatfish,\u201d as first coined in the eponymous Independent Film, <a href=\"http:\/\/www.urbandictionary.com\/define.php?term=catfish\">\u201cis someone who pretends to be someone they&#8217;re not[,] using Facebook or other social media to create false identities, particularly to pursue deceptive online romances.\u201d<\/a> The term was used to put similarity between an online impersonator and a catfish\u2019s behavior. Shippers use catfish to keep other fish active.\u00a0 In the same way, online impersonators keep you guessing. \u201cCatfishing\u201d is the act of impersonating someone online.<\/p>\n<p>But, even if you do not know the proper terminology, I am quite certain you have heard about the <a href=\"http:\/\/deadspin.com\/manti-teos-dead-girlfriend-the-most-heartbreaking-an-5976517\">Manti Te\u2019o scam<\/a>. If you haven\u2019t it\u2019s time to come out from underneath that rock.\u00a0 Aside from any possible opinions on whether Manti Te\u2019o knew he was in a relationship with a man or whether he made up the scam for publicity, one thing is clear: no one had Diane O\u2019Meara\u2019s permission to <a href=\"http:\/\/www.usatoday.com\/story\/gameon\/2013\/01\/24\/manti-te-o-lennay-kekua-diane-o-meara\/1860731\/\">create a Twitter profile with her name and photographs.<\/a><\/p>\n<p><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn1\">[1]<\/a>If you think a Heisman-hopeful Football player who got tricked into a relationship with a man is all this story entails, think about this:\u00a0 What if someone used <i>your<\/i> information?\u00a0 Even worse, what if someone set up an account in your name and spoke to your family? Your friends? Your co-workers? Your boss?\u00a0 The possibilities are limitless with this kind of impersonation.\u00a0 And, lawmakers are certainly catching on real fast.<\/p>\n<figure id=\"attachment_111\" aria-describedby=\"caption-attachment-111\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2013\/09\/militaryscammers.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-111\" alt=\"Military scammers impersonate Medal of Honor recipient Staff Sergeant Sal Giunta Photo courtesy of milblogging.com\" src=\"http:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2013\/09\/militaryscammers-300x260.png\" width=\"300\" height=\"260\" srcset=\"https:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2013\/09\/militaryscammers-300x260.png 300w, https:\/\/sites.law.duq.edu\/juris\/wp-content\/uploads\/2013\/09\/militaryscammers.png 584w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-111\" class=\"wp-caption-text\">Military scammers impersonate Medal of Honor recipient Staff Sergeant Sal Giunta<br \/>Photo courtesy of milblogging.com<\/figcaption><\/figure>\n<p>In his Time Magazine article, Victor Luckerson addresses just that: <a href=\"http:\/\/business.time.com\/2013\/01\/22\/can-you-go-to-jail-for-impersonating-someone-online\/\">\u201cCan You Go to Jail for Impersonating Someone Online?\u201d<\/a> Prospective legislation is not just aimed at the online relationships or impersonations, but also include measures against anti-bullying messages. This could prove very damaging for would-be impersonators.\u00a0 Impersonations without malice could be prosecuted in the same way as those who attempt to harass or de-fraud.<\/p>\n<p>Further, even if there is not a criminal statute in place that covers online impersonation, there are still private causes of action that may apply.\u00a0 <a href=\"http:\/\/www.gerberslaw.com\/can-manti-teo-sue-online-impersonation-catfishing-law\/\">For example<\/a>, Intentional Infliction of Emotional Distress, Fraud, Misrepresentation, and Negligence. But, all states that have created an applicable criminal offense have <a href=\"http:\/\/business.time.com\/2013\/01\/22\/can-you-go-to-jail-for-impersonating-someone-online\/\">a private cause of action.<\/a><\/p>\n<p>My Advice: Watch Out Catfish, it\u2019s Fishing Season.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\" align=\"center\"><b><span style=\"text-decoration: underline;\">Rundown of State Legislation on the Topic<\/span><\/b><\/p>\n<table class=\"aligncenter\" width=\"474\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"156\">\n<p style=\"text-align: left;\"><b><span style=\"text-decoration: underline;\">State<\/span><\/b><\/p>\n<\/td>\n<td width=\"156\"><b><span style=\"text-decoration: underline;\">Crime<\/span><\/b><\/td>\n<td width=\"156\"><b><span style=\"text-decoration: underline;\">Punishment<\/span><\/b><\/td>\n<\/tr>\n<tr>\n<td width=\"156\"><b>Arizona<\/b><\/td>\n<td width=\"156\">House Bill 2004-*NOT YET PASSED*<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn2\">[2]<\/a><\/td>\n<td width=\"156\">Class 5 Felony- Imprisonment up to 1.5 years<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn3\">[3]<\/a>Class 1 Misdemeanor- Up to 6 months Imprisonment<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn4\">[4]<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"156\"><b>California<\/b><\/td>\n<td width=\"156\">\u201cE-personation\u201d\/Criminal Impersonation<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn5\">[5]<\/a><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn6\">[6]<\/a><\/td>\n<td width=\"156\">Misdemeanor- Imprisonment for up to 1 year, up to $1000 fine<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn7\">[7]<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"156\"><b>Hawaii<\/b><\/td>\n<td width=\"156\">Harassment by Online Impersonation<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn8\">[8]<\/a><\/td>\n<td width=\"156\">Misdemeanor-Imprisonment up to 1 year<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn9\">[9]<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"156\"><b>Louisiana<\/b><\/td>\n<td width=\"156\">Online Impersonation<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn10\">[10]<\/a><\/td>\n<td width=\"156\">Misdemeanor- 10 days- 6 months Imprisonment,<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn11\">[11]<\/a> up to $1000 fine<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn12\">[12]<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"156\"><b>Mississippi<\/b><\/td>\n<td width=\"156\">Online Impersonation<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn13\">[13]<\/a><\/td>\n<td width=\"156\">Misdemeanor- 10 days-1 year Imprisonment, $250-$1000 Fine<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn14\">[14]<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"156\"><b>New York<\/b><\/td>\n<td width=\"156\">Criminal Impersonation in the 2d Degree<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn15\">[15]<\/a><\/td>\n<td width=\"156\">Class A Misdemeanor- Imprisonment for up to 1 year<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn16\">[16]<\/a>, up to $1000 fine<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn17\">[17]<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"156\"><b>Pennsylvania<\/b><\/td>\n<td width=\"156\">Criminal Online Impersonation*Referred to House Judiciary Committee*<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn18\">[18]<\/a><\/td>\n<td width=\"156\">Third Degree Misdemeanor- up to 90 <a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn19\">[19]<\/a>days Imprisonment, $250-$5000 Fine<\/td>\n<\/tr>\n<tr>\n<td width=\"156\"><b>Texas<\/b><\/td>\n<td width=\"156\">Online Impersonation<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn20\">[20]<\/a><\/td>\n<td width=\"156\">Felony in the third degree-\u00a0 2-10 years Imprisonment, up to $10,000 fine<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn21\">[21]<\/a>Class A Misdemeanor-Imprisonment for up to 1 year, up to $4000 fine<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn22\">[22]<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"156\"><b>Washington<\/b><\/td>\n<td width=\"156\">Electronic Impersonation<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn23\">[23]<\/a><\/td>\n<td width=\"156\">Civil Cause of Action<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_edn24\">[24]<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div style=\"text-align: center;\">\n<hr align=\"left\" size=\"1\" width=\"33%\" \/>\n<\/div>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.rajeshrana.net\/2011\/06\/29\/facebook-fake-profile-impersonation-helpline\/\">[1] http:\/\/www.rajeshrana.net\/2011\/06\/29\/facebook-fake-profile-impersonation-helpline\/<\/a><br \/>\n<a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref1\">[2]<\/a> <a href=\"http:\/\/milblogging.com\/index.php?entry=entry110102-132958\">http:\/\/milblogging.com\/index.php?entry=entry110102-132958<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref2\">[3]<\/a> <a href=\"http:\/\/kellywarnerlaw.com\/arizonas-online-impersonation-law\/\">http:\/\/kellywarnerlaw.com\/arizonas-online-impersonation-law\/<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref3\">[4]<\/a> <a href=\"http:\/\/kellywarnerlaw.com\/arizonas-online-impersonation-law\/\">http:\/\/kellywarnerlaw.com\/arizonas-online-impersonation-law\/<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref4\">[5]<\/a> <a href=\"http:\/\/kellywarnerlaw.com\/arizonas-online-impersonation-law\/\">http:\/\/kellywarnerlaw.com\/arizonas-online-impersonation-law\/<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref5\">[6]<\/a> <a href=\"http:\/\/voices.yahoo.com\/california-cyber-bully-bill-takes-effect-january-1-7510782.html?cat=17\">http:\/\/voices.yahoo.com\/california-cyber-bully-bill-takes-effect-january-1-7510782.html?cat=17<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref6\">[7]<\/a> <a href=\"http:\/\/www.leginfo.ca.gov\/pub\/09-10\/bill\/sen\/sb_1401-1450\/sb_1411_bill_20100927_chaptered.html\">http:\/\/www.leginfo.ca.gov\/pub\/09-10\/bill\/sen\/sb_1401-1450\/sb_1411_bill_20100927_chaptered.html<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref7\">[8]<\/a> <a href=\"http:\/\/voices.yahoo.com\/california-cyber-bully-bill-takes-effect-january-1-7510782.html\">http:\/\/voices.yahoo.com\/california-cyber-bully-bill-takes-effect-january-1-7510782.html<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref8\">[9]<\/a> <a href=\"http:\/\/www.capitol.hawaii.gov\/session2011\/bills\/HB618_HD1_.htm\">http:\/\/www.capitol.hawaii.gov\/session2011\/bills\/HB618_HD1_.htm<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref9\">[10]<\/a> <a href=\"http:\/\/law.justia.com\/codes\/hawaii\/2009\/volume-14\/title-37\/chapter-706\/hrs-0706-0663-htm\/\">http:\/\/law.justia.com\/codes\/hawaii\/2009\/volume-14\/title-37\/chapter-706\/hrs-0706-0663-htm\/<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref10\">[11]<\/a> <a href=\"http:\/\/www.haedickelaw.com\/2012\/08\/21\/impact-of-the-2012-louisiana-legislative-session-on-criminal-law-part-2\/\">http:\/\/www.haedickelaw.com\/2012\/08\/21\/impact-of-the-2012-louisiana-legislative-session-on-criminal-law-part-2\/<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref11\">[12]<\/a> <a href=\"http:\/\/www.haedickelaw.com\/2012\/08\/21\/impact-of-the-2012-louisiana-legislative-session-on-criminal-law-part-2\/\">http:\/\/www.haedickelaw.com\/2012\/08\/21\/impact-of-the-2012-louisiana-legislative-session-on-criminal-law-part-2\/<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref12\">[13]<\/a> <a href=\"http:\/\/svensonlaw.com\/2012\/08\/04\/interviewed-by-wvue-fox8-news-regarding-social-media-legislation\/\">http:\/\/svensonlaw.com\/2012\/08\/04\/interviewed-by-wvue-fox8-news-regarding-social-media-legislation\/<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref13\">[14]<\/a> <a href=\"http:\/\/www.pahouse.com\/pr\/191082412%281%29.asp\">http:\/\/www.pahouse.com\/pr\/191082412(1).asp<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref14\">[15]<\/a> <a href=\"http:\/\/www.pahouse.com\/pr\/191082412%281%29.asp\">http:\/\/www.pahouse.com\/pr\/191082412(1).asp<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref15\">[16]<\/a> <a href=\"http:\/\/ypdcrime.com\/penal.law\/article190.htm#p190.25\">http:\/\/ypdcrime.com\/penal.law\/article190.htm#p190.25<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref16\">[17]<\/a> <a href=\"http:\/\/codes.lp.findlaw.com\/nycode\/PEN\/TWO\/E\/70\/70.15\">http:\/\/codes.lp.findlaw.com\/nycode\/PEN\/TWO\/E\/70\/70.15<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref17\">[18]<\/a> <a href=\"http:\/\/ypdcrime.com\/penal.law\/article80.htm#p80.05\">http:\/\/ypdcrime.com\/penal.law\/article80.htm#p80.05<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref18\">[19]<\/a> <a href=\"http:\/\/www.pahouse.com\/pr\/191082412%281%29.asp\">http:\/\/www.pahouse.com\/pr\/191082412(1).asp<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref19\">[20]<\/a> <a href=\"http:\/\/law.onecle.com\/pennsylvania\/fish\/00.009.023.000.html\">http:\/\/law.onecle.com\/pennsylvania\/fish\/00.009.023.000.html<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref20\">[21]<\/a> <a href=\"http:\/\/www.stradleylaw.com\/online-impersonation-crime-texas\/\">http:\/\/www.stradleylaw.com\/online-impersonation-crime-texas\/<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref21\">[22]<\/a> <a href=\"http:\/\/www.statutes.legis.state.tx.us\/Docs\/PE\/htm\/PE.12.htm\">http:\/\/www.statutes.legis.state.tx.us\/Docs\/PE\/htm\/PE.12.htm<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref22\">[23]<\/a> <a href=\"http:\/\/www.statutes.legis.state.tx.us\/Docs\/PE\/htm\/PE.12.htm\">http:\/\/www.statutes.legis.state.tx.us\/Docs\/PE\/htm\/PE.12.htm<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref23\">[24]<\/a> <a href=\"http:\/\/apps.leg.wa.gov\/documents\/billdocs\/2011-12\/Pdf\/Bills\/Session%20Laws\/House\/1652-S2.SL.pdf\">http:\/\/apps.leg.wa.gov\/documents\/billdocs\/2011-12\/Pdf\/Bills\/Session%20Laws\/House\/1652-S2.SL.pdf<\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"\" href=\"http:\/\/www.blogger.com\/blogger.g?blogID=4899321661394764168#_ednref24\">[25]<\/a> <a href=\"http:\/\/apps.leg.wa.gov\/documents\/billdocs\/2011-12\/Pdf\/Bills\/Session%20Laws\/House\/1652-S2.SL.pdf\">http:\/\/apps.leg.wa.gov\/documents\/billdocs\/2011-12\/Pdf\/Bills\/Session%20Laws\/House\/1652-S2.SL.pdf<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Amy Coleman, Staff Writer For those that are not up to speed on the Facebook lingo, a \u201cCatfish,\u201d as first coined in the eponymous Independent Film, \u201cis someone who pretends to be someone they&#8217;re not[,] using Facebook or other social media to create false identities, particularly to pursue deceptive [\u2026] <\/p>\n<div class=\"clear\"><\/div>\n<p><a class=\"more_link clearfix\" href=\"https:\/\/sites.law.duq.edu\/juris\/2013\/04\/19\/catfish-season\/\" rel=\"nofollow\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":110,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,4],"tags":[],"class_list":["post-109","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-juris-blog","category-posts"],"_links":{"self":[{"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/posts\/109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/comments?post=109"}],"version-history":[{"count":2,"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/posts\/109\/revisions"}],"predecessor-version":[{"id":113,"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/posts\/109\/revisions\/113"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/media\/110"}],"wp:attachment":[{"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/media?parent=109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/categories?post=109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.law.duq.edu\/juris\/wp-json\/wp\/v2\/tags?post=109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}